160 likes | 235 Vues
Do you really think that your personal data is protected ?. Well… Think Again !!!. WE ARE DATA. By Hazim Zaidani. We all live in a hyperconnected world. A world full with opportunities and accessibilities.
E N D
Do you really think that your personal data is protected ? Well… Think Again !!! WE ARE DATA By Hazim Zaidani
We all live in a hyperconnectedworld
A world full with opportunities and accessibilities
Connection is made possible through the Internet, telecommunication networks and digital devices.
Smartphones Laptops Tablets
Internet Social Media
We Malaysians use quite a lot of technology in our daily lives. However, most of us do not know how to secure our digital data !!!
How do we Malaysians secure our digital data? Be Alert of Imposters Make sure you know who is receiving your personal or financial information. Unless you know who you’re dealing with, don’t give out personal information over the phone or Internet.
Dispose of Personal Information Safely Before you dispose of a computer, destroy all personal information stored inside. Use a “disk-wiping” software to overwrite the whole hard drive.
Encrypt Your Data Secure your browser. Guard your online transactions by using encryption software that scrambles information you send over the Internet. Also, check for a “lock” icon before you send any personal or financial information online. This icon located on the status bar of your Internet browser means your information will be safe when it’s transferred. Keep Passwords Private Use strong passwords for your laptop, credit, bank, and other accounts. Be creative: have a variety of characters in your password. Avoid using the same password for everything.
Don’t Reveal Too Much on Social Networking Sites Too much information about yourself posted online can enable an identity thief to use it to answer ‘security’ questions on your accounts and obtain access to your money. Try to limit access to your networking page to a small group of friends.
Conclusion All of us need to be well aware of our digital data. Now, every device is connected via various types of connections. So, it is essential for us to protect our data from intruders and cyber crime. After all, we are all data…
Audio Credits References Graphics Credits http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure Music By Free Stock Music http://www.freestockmusic.com/2012/cinematic-production-music/free-cinematic-stock-music-all-that-remains/ http://www.youtube.com/watch?v=R30nj2W3_Z0 http://www.youtube.com/watch?feature=player_detailpage&v=By_82VFFCFA http://alcscorp.com/wp/wp-content/uploads/2013/08/computer-hardware-free-stock-vector-set-laptop-portable.jpg http://images.all-free-download.com/images/graphicmedium/internet_icon_55605.jpg http://www.vectorgraphit.com/wp-content/uploads/2013/08/phone2.jpg http://www.idealaunch.com/blog/wp-content/uploads/2013/06/166200651-vector-network-tree-with-social-media-icons.jpg http://www.land-of-web.com/wp-content/uploads/2013/06/2147.jpg http://www.yewboon.com/wp-content/uploads/2009/09/1-malaysia-logo.jpg Software Used Microsoft Powerpoint 2013 Audacity